What is Valari?

Valari is a Web Application Firewall & Security Management System designed to secure your web applications from attacks and provide a layer of security by proxy-ing all HTTP(S) traffic and shield web servers and databases from direct access of the attackers irrespective of the underlying application vulnerabilities.

Valari can detect and block all the OWASP Top 10 Vulnerabilities and many more Web application threats:

Full Web Traffic Logging : contents in the web Request bodies are not logged by the web servers and hence attackers use POST requests to delivery exploits and it goes completely blind on the web server logs. With full HTTP transaction logging in VALARI, itis possible to log all requests and responses. This Logging feature can be controlled on what and when a log is created. VALARI can be configured to mask the sensitive data in the request and/or response fields before they are written to the audit log.

Attack Prevention and External Patching / Virtual Patching : VALARI acts immediately to prevent attacks from reaching your web applications. With more than 20,000 specific rules, VALARI is an ideal external patching tool. External patching (referred to as Virtual Patching) is about reducing the window of opportunity as the time needed to fix / patch application vulnerabilities often take weeks to months. With VALARI, application vulnerabilities can be patched from the WAF Layer without patching the application source code making your applications secure until a proper patch is applied to the application by your development team or vendors.

Flexible Rule Engine : The Heart of VALARI is made up of our flexible rule engine with more than 20,000 specific rules covering all sorts of application vulnerabilities, signature patterns and evasion patterns. Our Rule engine is implemented with hardening, protocol validation and detection of web application security issues and is kept updated on regular basis as and when vulnerabilities and attack vectors evolve.

Integrated Security Rules from various public vulnerability data signature sources and VALARI correlates data from all these numerous sources to generate the Flexible – Scalable – Reliable rules, automatically updating daily and as needed. Various vulnerability data signature sources include :

Kaapagam Tech Rule Set

Public vulnerability data such as the Open Source Vulnerability Database (OSVDB)

Honeypot systems

High Availability Deployment option with Active & Passive VALARI Units with identical rule sets and configurations. The Passive VALARI unit can be put-in action if the primary VALARI unit is down for any unforeseen circumstances.